Shadow Search speeds up the security operations process, quickly enabling deeper research and faster invest...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.
The team is looking back at three years of ShadowTalk and taking us on a journey through changes in the threat landscape.
This guide shares years of operational best practices and expands on where dark web intelligence is useful and can be effectively leveraged into action for security teams.
The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.
This report discusses Intel Updates affecting the media and telecommunications sector in the first quarter of 2021 (Q1 2021).
A cyber-espionage campaign was found targeting the Vietnamese military and government, as well as other sectors and some entities in Thailand and Central Asia.
This report discusses Intel Updates affecting the travel-and-leisure sector in the first quarter of 2021 (Q1 2021).
Join Digital Shadows to learn about exciting new functionality, which helps organizations of all sizes to get value out of Cyber Threat Intelligence.
This report discusses cyber events affecting the energy sector in the first quarter of 2021 (Q1 2021).
A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.
Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.
This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.
The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.
Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.
A new round of software attacks has raised another red flag concerning supply-chain security and the prevalence of third-party supply-chain targeting.
The French National Cybersecurity Agency (ANSSI) identified a new “Ryuk” ransomware variant that has the capability to self-propagate across victim networks.
The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.
Initial Access Brokers: A Deep Dive - Webinar Feb 2021
Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.